KEY DISTRIBUTION
First Claim
Patent Images
1. A machine-implemented method to execute on a router, comprising:
- servicing, by the router, network transactions for a participant, the network transactions are encrypted with a first key;
detecting, by the router, a transition of the participant to a neighboring network serviced by a neighboring service provider;
contacting, by the router, the neighboring service provider on behalf of the participant to acquire a second key for use with other network transactions serviced through the neighboring service provider, the other network transactions are encrypted with the second key; and
distributing, by the router, the second key to the participant for transitioning to the participant to the neighboring service provider.
15 Assignments
0 Petitions
Accused Products
Abstract
Methods and systems are provided for trusted key distribution. A key distribution or an identity service acts as an intermediary between participants to a secure network. The service provisions and manages the distribution of keys. The keys are used for encrypting communications occurring within the secure network.
98 Citations
20 Claims
-
1. A machine-implemented method to execute on a router, comprising:
-
servicing, by the router, network transactions for a participant, the network transactions are encrypted with a first key; detecting, by the router, a transition of the participant to a neighboring network serviced by a neighboring service provider; contacting, by the router, the neighboring service provider on behalf of the participant to acquire a second key for use with other network transactions serviced through the neighboring service provider, the other network transactions are encrypted with the second key; and distributing, by the router, the second key to the participant for transitioning to the participant to the neighboring service provider. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A machine-implemented method to execute on a router, comprising:
-
moving, by the router, a connection of a processing device from a local homogeneous secure network to a heterogeneous secure network when the processing device is determined to in process of transitioning out of the homogeneous secure network service area; acquiring, by the router, a second key from a neighboring service provider before the processing device transitions out of the homogeneous secure network service area; configuring, by the router, the processing device to use encrypted communications that utilize the second key when the processing device transitions to the heterogeneous secure network of the neighboring service provider. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A machine-implemented system, comprising:
a key distribution service configured to interact with a router and to authenticate the router and to provide the router with a new encryption key for an edge device that is transitioning from a first secure network to a second secure network. - View Dependent Claims (16, 17, 18, 19, 20)
Specification